MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a701108be3d3802eba7c79c5c68afc0fee833595cdada8df5ac02ef9b97d2ad1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: a701108be3d3802eba7c79c5c68afc0fee833595cdada8df5ac02ef9b97d2ad1
SHA3-384 hash: 1fa21954c1f58dd10183b80f71e128dc7152132d1110d2faf5f2dce6982c04ae72893ab57c9bfc18b1dd120a0bac30e1
SHA1 hash: 651622388600efdc8e6ee4a92df6981d3881e5e9
MD5 hash: a11d1c066d6bd8e35bec3f985649e112
humanhash: oklahoma-sierra-ten-king
File name:WR0Z3N.dll
Download: download sample
Signature BazaLoader
File size:156'672 bytes
First seen:2021-07-28 15:52:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 1536:nxdifoVqWb2t3SLXMUthlUbf6cLRcJyXBq77TS1Vyzaw30qA/cimkd8TfnDItLqz:TMoVtb+37UP6jbK8q7PvJTLli1tq
Threatray 43 similar samples on MalwareBazaar
TLSH T181E39E6B51C80291E28A7A7CDF5EA7B3E195F5BB0A85A108333FC5F6F36658AC101343
Reporter malware_traffic
Tags:bazacall BazaLoader BazarCall BazarLoader dll


Avatar
malware_traffic
Run method: rundll32 [filename],GlobalOut

Intelligence


File Origin
# of uploads :
1
# of downloads :
180
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
WR0Z3N.dll
Verdict:
Malicious activity
Analysis date:
2021-07-28 15:49:26 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Bazar Loader
Detection:
malicious
Classification:
spyw.evad
Score:
96 / 100
Signature
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Detected Bazar Loader
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Sample uses process hollowing technique
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 455614 Sample: WR0Z3N.dll Startdate: 28/07/2021 Architecture: WINDOWS Score: 96 30 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->30 32 Detected Bazar Loader 2->32 34 Sigma detected: Suspicious Svchost Process 2->34 8 loaddll64.exe 1 2->8         started        10 rundll32.exe 2->10         started        process3 process4 12 cmd.exe 1 8->12         started        14 rundll32.exe 8->14         started        17 rundll32.exe 8->17         started        signatures5 19 rundll32.exe 15 12->19         started        44 Contains functionality to inject code into remote processes 14->44 process6 dnsIp7 26 195.123.233.106, 443, 49716 GREENFLOID-ASUA Bulgaria 19->26 36 System process connects to network (likely due to code injection or exploit) 19->36 38 Sets debug register (to hijack the execution of another thread) 19->38 40 Writes to foreign memory regions 19->40 42 4 other signatures 19->42 23 svchost.exe 14 19->23         started        signatures8 process9 dnsIp10 28 13.52.241.196, 443, 49721, 49724 AMAZON-02US United States 23->28
Gathering data
Result
Malware family:
bazarbackdoor
Score:
  10/10
Tags:
family:bazarbackdoor backdoor suricata
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Blocklisted process makes network request
Bazar/Team9 Backdoor payload
BazarBackdoor
suricata: ET MALWARE Observed Malicious SSL Cert (BazaLoader CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (Bazar Backdoor)
Unpacked files
SH256 hash:
a701108be3d3802eba7c79c5c68afc0fee833595cdada8df5ac02ef9b97d2ad1
MD5 hash:
a11d1c066d6bd8e35bec3f985649e112
SHA1 hash:
651622388600efdc8e6ee4a92df6981d3881e5e9
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments